2021
DOI: 10.1142/s179383092150141x
|View full text |Cite
|
Sign up to set email alerts
|

A secure image cryptosystem via multiple chaotic maps

Abstract: This work focused on introducing a new two-dimensional (2D) chaotic system. It is combined of some existing maps, the logistic, iterative chaotic map with infinite collapse, and Henon maps; we called it 2D-LCHM. The assessment of the actual performance of 2D-LCHM presents its sensitivity to a tiny change in the initial condition. Besides, its dynamics behavior is very complicated. It also has hyperchaotic properties and good ergodicity. The proposed system is occupied with designing a new image encryption syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…Iterative chaotic mapping is characterized by strong chaos and pseudo-randomness. Compared with the initialization strategy of randomly generating the initial position, iterative chaotic mapping can make the population more evenly distributed in the search space [30]. If a population has n individuals, then the random initial population X = {x ,...,x ,...,x }, k∈ [1, n], and the mathematical expression is as follows:…”
Section: Improved Arithmetic Optimization Algorithm Based On Iterativ...mentioning
confidence: 99%
“…Iterative chaotic mapping is characterized by strong chaos and pseudo-randomness. Compared with the initialization strategy of randomly generating the initial position, iterative chaotic mapping can make the population more evenly distributed in the search space [30]. If a population has n individuals, then the random initial population X = {x ,...,x ,...,x }, k∈ [1, n], and the mathematical expression is as follows:…”
Section: Improved Arithmetic Optimization Algorithm Based On Iterativ...mentioning
confidence: 99%
“…Chaotic maps are studied today as one of the most powerful tools in cryptography [36]. Sensitivity to initial conditions and sensitivity to control parameters in chaotic maps are the main reasons for choosing these maps as the central pillar of encryption algorithms [37].…”
Section: Introductionmentioning
confidence: 99%
“…Some emerging technologies, such as chaotic systems, are considered a suitable choice for constructing secure encryption algorithms [1][2][3][4][5]. This is due to their promising features, namely, ergodicity, unpredictability, sensitivity to the initial condition, and generating random-like behavior sequences.…”
Section: Introductionmentioning
confidence: 99%